US7626929B2 - Methods and apparatus for predictive call admission control within a media over internet protocol network - Google Patents
Methods and apparatus for predictive call admission control within a media over internet protocol network Download PDFInfo
- Publication number
- US7626929B2 US7626929B2 US11/690,348 US69034807A US7626929B2 US 7626929 B2 US7626929 B2 US 7626929B2 US 69034807 A US69034807 A US 69034807A US 7626929 B2 US7626929 B2 US 7626929B2
- Authority
- US
- United States
- Prior art keywords
- cac
- exchange device
- session
- predictive
- session exchange
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000004364 calculation method Methods 0.000 claims abstract description 19
- 238000004891 communication Methods 0.000 claims description 27
- 230000004044 response Effects 0.000 claims description 11
- 230000001960 triggered effect Effects 0.000 claims description 4
- 230000015654 memory Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000005259 measurement Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/822—Collecting or measuring resource availability data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/15—Flow control; Congestion control in relation to multipoint traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
- H04L47/783—Distributed allocation of resources, e.g. bandwidth brokers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/83—Admission control; Resource allocation based on usage prediction
Definitions
- the invention relates generally to call admission control, and, in particular, to predictive global call admission control within a media over Internet Protocol network.
- CAC limits are often used in a media over Internet Protocol (MoIP) network to prevent over subscription of components within the MoIP network.
- MoIP media over Internet Protocol
- CAC conditions are often used at egress points within a MoIP network to control the number of calls routed through components at any given time.
- CAC conditions are typically applied at the egress points because egress points have access to real-time call data.
- an ingress point hunts for an endpoint that is ready to accept a call and establish a session an ingress point is typically required to send serially a session request and wait for a response from each of several egress points as they apply CAC conditions to determine whether or not call capacity is available.
- a method includes receiving at an ingress session exchange device a call admission control (CAC) condition and a CAC value associated with an endpoint of a first egress session exchange device and CAC-related information associated with an endpoint of a second egress session exchange device.
- the ingress session exchange device is at a border of a session over internet protocol network.
- a first call admission calculation is performed at the ingress session exchange device to determine whether the CAC condition is satisfied.
- a second call admission calculation is performed at the ingress session exchange device when the CAC condition is unsatisfied. The first call admission calculation and second call admission calculation are based on the CAC-related information.
- FIG. 1 is a schematic diagram that illustrates session exchange devices in communication with a network, according to an embodiment of the invention.
- FIG. 2 is a schematic diagram that illustrates an ingress session exchange device and an egress session exchange device in communication with a network, according to an embodiment of the invention.
- FIG. 3 is a schematic diagram of a timeline that illustrates the receipt and processing of information at an ingress device, according to an embodiment of the invention.
- FIG. 4 is a table that illustrates call admission control (CAC) values and corresponding time values that are used to calculate a predictive CAC value, according to an embodiment of the invention.
- CAC call admission control
- FIG. 5 is a flowchart that illustrates a method for routing an incoming call to one of several egress session exchange devices, according to an embodiment of the invention.
- Session exchange devices at the borders of a media over Internet Protocol (MoIP) network can be configured to control and/or manage traffic into and out of the MoIP network.
- a call e.g., Voice over Internet Protocol (VoIP) call, Session over Internet Protocol (SoIP) call
- VoIP Voice over Internet Protocol
- SoIP Session over Internet Protocol
- a source endpoint disposed outside of the MoIP network can be received at an ingress session exchange device (i.e., entry point session exchange device) and routed through the MoIP network to an egress session exchange device (i.e., exit point session exchange device) that can forward the call to a destination endpoint.
- the egress session exchange device can also forward the call to network resources outside of the MoIP network that are configured to route the call to the destination endpoint.
- an ingress session exchange device that receives a call can route the call through the MoIP network to one of several session exchange devices that can function as an egress device.
- the routing can be performed, in part, by defining a session request to route the call.
- the ingress session exchange device can be configured to route (e.g., trigger routing of) the call through the MoIP network to an egress device based on, for example, the call capacity of outside network resources and/or destination endpoints in communication with the egress device. For example, the ingress session exchange device can route a call to a particular egress device based on a call admission determination associated with a network resource in communication with the egress device. Ingress session exchange devices can be configured to receive and use call admission control (CAC)-related information to make call admission and/or routing determinations for an incoming call from a source endpoint.
- CAC call admission control
- the CAC-related information is open systems interconnections (OSI) layer-5 information that includes, but is not limited to CAC values/data, CAC metadata, and CAC conditions (e.g., CAC limits) related to network resources and/or destination endpoints (e.g., intermediate endpoints) in communication with an egress device.
- the CAC-related information which is used by an egress device to make call admission determinations in response to a session request from an ingress device, can be acquired/produced at the egress device and sent to an ingress device for use at the ingress device.
- the call admission and/or routing determinations (e.g., calculations) can be used to define a session request that can be sent from the ingress session exchange device to one of several egress session exchange devices.
- network resources e.g., switches, routers, cables
- the ingress device can use CAC-related information to calculate an appropriate route and/or destination endpoint with a high probability of accepting an incoming call rather than using network resources to serially hunt for an available resource through egress devices.
- An ingress device can use the CAC-related information to promote a bandwidth sharing profile (e.g., level-loading) between multiple egress devices and/or multiple destination endpoints outside of, for example, a MoIP network.
- An ingress device can make call admission determinations and/or routing determinations to decrease or increase traffic on particular destination endpoints or egress devices.
- an ingress device can also be configured to use historical CAC-related information to determine whether or not an incoming call from a source endpoint can be accepted by an egress device and/or destination endpoint. For example, an ingress device can use the CAC-related information to predict whether or not a destination endpoint or egress device will be able to accept a call at a specified time or period of time when CAC-related information associated with that specified point in time or time period is not available. Predictions can be calculated based on a variety of mathematical algorithms and/or equations that include, for example, one or more prediction index values. In some embodiments, the ingress device can make call admission determinations and/or call routing determinations based on a collection of CAC-related information associated with one or more egress devices and/or destination endpoints (i.e., global CAC-related information).
- FIG. 1 is a schematic diagram that illustrates session exchange devices 110 , 120 , and 130 in communication with a network 140 , according to an embodiment of the invention.
- the network 140 can be a wireless or wired network configured to transmit data and/or media content such as voice content and/or video content. For example, portions of the network 140 can be used for MoIP sessions such as VoIP sessions.
- the session exchange devices 110 , 120 , and 130 can be, for example, multi-protocol session exchange devices configured to operate as session border controllers for the network 140 .
- the session exchange devices 110 , 120 , and 130 each are configured to establish, control, and monitor connections between one or more endpoints 150 .
- the session exchange devices 110 , 120 , and 130 can be connected with a network controller (not shown) that is a centralized management component that controls, configures, and coordinates the network 140 .
- the session exchange devices 110 , 120 , and 130 can be configured to modify routing of calls using, OSI layer 5 parameters (e.g., CAC-related information) and/or OSI layer 3 parameters.
- Each of the session exchange devices 110 , 120 , and 130 are in communication with at least one endpoint 150 . In some embodiments, more than one of the session exchange device 110 , 120 , and/or 130 can be in communication with a single endpoint 150 .
- the session exchange devices 110 , 120 , and/or 130 can be configured as ingress session exchange devices and/or egress session exchange devices that process incoming and/or outgoing calls.
- the endpoints 150 likewise, can be source and/or destination endpoints.
- Each of the session exchange devices 110 , 120 , and 130 is configured to send periodically or continuously CAC-related information associated with their respective endpoints 150 to other session exchange devices 180 .
- session exchange device 120 can be configured to send CAC-related information associated with one or more of its endpoints 150 to session exchange devices 110 and/or 130 .
- the CAC-related information can be sent based on, for example, a list of CAC parameters or a user-defined policy.
- the CAC-related information can be, for example, broadcast to other devices using routing update protocols such as open shortest path first (OSPF), routing information protocol (RIP), and/or telephony routing over Internet Protocol (TRIP).
- OSPF open shortest path first
- RIP routing information protocol
- TRIP telephony routing over Internet Protocol
- Each of the session exchange devices 110 , 120 , and 130 can be configured to receive, store, and/or process the CAC-related information received from other session exchange devices 110 , 120 , and/or 130 so that each session exchange device 110 , 120 , and/or 130 , when acting as an ingress device, can make call admission determinations.
- the call admission determinations i.e., whether or not a call can be admitted by one or more endpoints 150 ) can be used to make routing decisions.
- Each of the session exchange devices 110 , 120 , and 130 can be configured to process the CAC-related information, for example, when determining whether or not to route (e.g., trigger routing of) a call received at the session exchange device from an endpoint 150 to another endpoint associated with a different session exchange device 110 , 120 , and/or 130 .
- route e.g., trigger routing of
- the call admission processing can be performed at each of the session exchange devices 110 , 120 , and 130 .
- the routing decisions can be distributed to each of the session exchange devices 110 , 120 , and 130 without relying on a centralized routing engine. Distributing the call admission determinations to ingress session exchange devices allows for efficient scalability of a network of session exchange devices because the session exchange devices are not required to rely on a centralized routing engine.
- session exchange device 130 when acting as an ingress device, can use CAC conditions and CAC values associated with endpoints 150 in communication with session exchange device 120 to determine whether or not to route an incoming call to any one of the endpoints 150 in communication with session exchange device 120 . If, for example, the endpoints 150 in communication with session exchange device 120 are determined to be at capacity based on a call admission determination, the session exchange device 130 can request that a session be established with session exchange device 110 . In other words, a routing determination can be made based on whether a CAC condition is satisfied or unsatisfied based on one or more CAC values. Depending upon the structure of the CAC condition, the CAC condition can be satisfied or unsatisfied, for example, when a CAC limit is exceeded.
- session exchange device 130 can determine based on a global policy whether or not resources could be more appropriately used if a particular call is routed to, for example, an endpoint 150 associated with session exchange device 120 rather than an endpoint 150 associated with session exchange device 110 .
- session exchange device 130 can make routing determinations based on a global view of resources associated with the other session exchange devices 110 , and 120 . More detailed examples of call routing at session exchange devices are described below in connection with FIG. 2 .
- the CAC-related information can be sent from any of the session exchange devices 110 , 120 , and/or 130 to other session exchange devices 110 , 120 , and/or 130 at specified times, at specified time intervals, in response to a global or individual trigger signal, and/or when a specified threshold level of CAC-related information is, for example, stored at any of the session exchange device 110 , 120 , and/or 130 .
- Any of the session exchange devices 110 , 120 , and 130 can be configured to send CAC-related information to one or more specified session exchange devices 110 , 120 , and/or 130 , for example, in response to an instruction or trigger signal.
- the instruction can be, for example, a policy (e.g., user-defined policy) that defines which CAC-related information is to be collected and/or sent.
- the endpoints 150 can be, for example, a public switched telephone network (PSTN), a broadband network that can provide network access to broadband consumers, an enterprise network, an H.323 network, a session initiation protocol (SIP) softswitch network, or a SIP network.
- PSTN public switched telephone network
- An endpoint 150 can also be an individual phone/computer terminal or an access point (e.g., another SBC) to another MoIP network.
- the various endpoints 150 can include any combination of the above examples.
- Each of the endpoints 150 is an endpoint from the perspective of the individual session exchange device 110 , 120 , and/or 130 that is in communication with that endpoint 150 .
- the session exchange devices 110 , 120 , and 130 can operate as multi-protocol session exchange devices that function as interface devices between different types of endpoints 150 (e.g., networks).
- the session exchange devices 110 , 120 , and 130 can be configured to translate a protocol from one endpoint 150 into a protocol associated with a different endpoint 150 .
- FIG. 2 is a schematic diagram that illustrates an ingress session exchange device 230 and two egress session exchange devices 210 and 220 in communication with a network 240 , according to an embodiment of the invention.
- the ingress session exchange device 230 is configured to receive (e.g., via an input port (not shown)) an incoming call from a source endpoint 250 such as a VoIP phone.
- the egress session exchange device 210 is in communication with an intermediate endpoint 260 and the egress session exchange device 220 is in communication with two intermediate endpoints 270 and 280 .
- the intermediate endpoints 260 , 270 , and 280 are endpoints from the perspective of their respective egress session exchange devices 210 and 220 .
- the intermediate endpoints 260 , 270 and 280 are in communication with a destination endpoint 290 .
- the incoming call request from the source endpoint 250 can be routed to the destination endpoint 290 through any one of the egress session exchange devices 210 and 220 .
- the ingress session exchange device 230 and egress session exchange devices 210 and 220 are configured to establish sessions such that the source endpoint 250 and the destination endpoint 290 can engage in a media content exchange such as a voice signal exchange (i.e., VoIP).
- a session is a connection used for exchanging internet protocol (IP) packets (e.g., data packets, media content packets) and established using the session layer of the OSI model.
- IP internet protocol
- a session can be established using a protocol such as session initiation protocol (SIP).
- the devices and endpoints in FIG. 2 are arranged such that a call is processed in one direction to simplify the discussion.
- the ingress session exchange device 230 is configured to request a session for the incoming call from the source endpoint 250 .
- the destination endpoint 290 can be an endpoint that initiates a call, in which case the destination endpoint 290 would be functioning as a source endpoint.
- the egress session exchange devices 210 and 220 can be in communication with multiple destinations and/or additional intermediate endpoints (not shown) in addition to the intermediate endpoints 260 , 270 and 280 .
- each of the intermediate endpoints 260 , 270 and 280 can be in communication with additional destination endpoints (not shown) and/or intermediate endpoints (not shown) in addition to destination endpoint 290 .
- the ingress session exchange device 230 can be configured to determine which of the egress session exchange devices 210 or 220 can be used to establish ingress and egress sessions for the incoming call of the source endpoint 250 so that the call can be forwarded to the destination endpoint 290 . In other words, the ingress session exchange device 230 can determine whether or not the incoming call can be routed through the egress session exchange devices 210 and 220 . This determination is based on CAC-related information associated with the intermediate endpoints 260 , 270 and/or 280 .
- the ingress session exchange device 230 can determine, using the CAC-related information, whether any of the intermediate endpoints 260 , 270 and 280 have capacity to accept an incoming call. If intermediate endpoint 270 can accept a call based on the CAC-related information processed at the ingress session exchange device 230 , ingress session exchange devices 230 can request that a session be established between egress session exchange device 220 and ingress session exchange device 230 . If the egress session exchange device 220 accepts the request, a session can be established between the egress session exchange device 220 and the ingress session exchange device 230 . This session will be an ingress session from the perspective of the egress session exchange device 220 .
- the egress session exchange device 220 can then request a session (i.e., egress session from the perspective of the egress session exchange device 220 ) be established with the intermediate endpoint 270 so that the incoming call can be forwarded to the destination endpoint 290 through the intermediate endpoint 270 .
- a session i.e., egress session from the perspective of the egress session exchange device 220
- the egress session exchange devices 210 and 220 are configured to send CAC-related information to the ingress session exchange device 230 because the egress session exchange devices 210 and 220 , respectively, are in communication with the intermediate endpoints 260 , 270 and 280 and can directly acquire the CAC-related information.
- the CAC-related information is received at the ingress session exchange device 230 (e.g., via an input port (not shown)) from the egress session exchange devices 210 and 220 and stored in a memory 234 .
- the ingress session exchange device 230 can process the CAC-related information stored in the memory 234 at processor 232 to determine which of the egress session exchange devices, 210 or 220 can accept the incoming call from source endpoint 250 .
- the ingress session exchange device 230 based on this determination, can define a request to trigger the establishment of sessions (e.g., using a particular device) for the incoming call.
- the CAC-related information can be retrieved from the memory 234 and manipulated by the processor 232 at ingress session exchange device 230 before being used to make a call acceptance/routing determination. For example, CAC-related information associated with one or more of the endpoints 270 and/or 280 can be averaged or otherwise mathematically manipulated.
- the ingress session exchange device 230 can receive at least three types of CAC-related information: CAC conditions, CAC values, and/or CAC metadata.
- the CAC conditions are conditions (e.g., threshold limits) that can be used to determine whether or not, for example, an incoming call can be accepted by and/or routed to one or more of the intermediate endpoints 260 , 270 and/or 280 through the respective egress session exchange devices 210 and 220 . If an incoming call can be accepted, a session request can be defined and sent to, for example, at least one of the egress session exchange devices 210 or 220 to route the call.
- the intermediate endpoints 260 , 270 and/or 280 can be associated with one or more different CAC conditions including, for example, global CAC limits.
- the CAC values are values that can be used to make a call admission determination based on a corresponding CAC condition.
- the CAC conditions and/or CAC values can be related to any parameter value that can be used to make a call admission determination.
- the CAC values and/or conditions e.g., limits
- a CAC value can be associated with one or more intermediate endpoints 260 , 270 and/or 280 .
- CAC values that are not associated with a CAC condition can also be received at the ingress session exchange device 230 .
- a CAC condition is satisfied when, for example, a call limit is exceeded.
- the CAC metadata is data that is associated with the CAC conditions and/or CAC values.
- the CAC metadata values can include, for example, a timestamp value (e.g., date and time), an address of the destination endpoint, a quality-of-service (QoS) parameter value, a security restriction value, a username, and/or a session or call identifier (ID). More details regarding data that can be associated at the session layer are set forth in co-pending application Ser. No. 11/343,218, “Session Data Records and Related Alarming within a Session Over Internet Protocol (SOIP) Network,” which is incorporated herein by reference in its entirety.
- SOIP Session Over Internet Protocol
- the ingress session exchange device 230 can determine that the intermediate endpoint 270 can accept a call originating at source endpoint 250 .
- the ingress session exchange device 230 can define and send a request to route (e.g., trigger routing of) an incoming call from, for example, source endpoint 250 through intermediate endpoint 270 .
- the routing can be, in part, accomplished by defining a request to establish a session between the ingress session exchange device 230 and egress session exchange device 220 because egress session exchange device 220 is in communication with intermediate endpoint 270 .
- the ingress session exchange device 220 can receive a CAC condition that indicates intermediate endpoint 280 is configured to process only 10 MB/s of information at any given time and receives a CAC value that indicates the intermediate endpoint 280 is currently processing 10 MB/s of information.
- the ingress session exchange device 230 can use this CAC condition and CAC value to determine that the intermediate endpoint 280 cannot accept a call originating at source endpoint 250 because the intermediate endpoint 280 is already operating at capacity (e.g., CAC condition is not satisfied).
- the ingress session exchange device 230 can, for example, define and send a request (e.g., session request) to route (e.g., trigger routing of) an incoming call through a different intermediate endpoint such as intermediate endpoint 270 .
- a request e.g., session request
- route e.g., trigger routing of
- the CAC-related information associated with each of the endpoints 260 , 270 and/or 280 can be acquired, defined, and/or stored by the egress session exchange device 220 before being sent to the ingress session exchange device 230 (e.g., via an output port at egress session exchange device 220 (not shown)).
- some CAC-related information can be collected at the egress session exchange device 220 as sessions/calls are established through any endpoints such as intermediate endpoints 270 and 280 .
- the egress session exchange device 220 can be configured to store (e.g., log) CAC-related values associated with the session/call in a memory 226 .
- the egress session exchange device 220 can store, for example, CAC metadata such as a time of the session/call, an address of the source endpoint, an address of the destination endpoint, and/or a quality-of-service (QoS) parameter value.
- QoS quality-of-service
- CAC-related information such as CAC conditions can be defined at the egress session exchange devices 210 and/or 220 by, for example, a network administrator based on a global policy or sent to the egress session exchange device 210 and/or 220 for storage on the memory 226 .
- Each of the intermediate endpoints 260 , 270 and 280 can be associated with one or more different CAC conditions or one or more global CAC conditions.
- the egress session exchange devices 210 and/or 220 respectively, can be configured to send the CAC-related information associated with the intermediate endpoints 260 , 270 and/or 280 without storing the CAC-related information in their respective memories 216 and 226 .
- the ingress session exchange device 230 can request that specified CAC-related information be sent from the egress session exchange devices 210 and/or 220 so that the ingress session exchange device 230 can route a particular call that has been initiated at the source endpoint 250 .
- the ingress session exchange device 230 can request from egress session exchange devices 210 and/or 220 the most recent bandwidth measurement values associated with their respective intermediate endpoints 260 , 270 and/or 280 .
- the ingress session exchange device 230 when it receives the bandwidth measurement values, can use the bandwidth measurement values to make a call admission determination and subsequently define a request for a session using a particular device (e.g., routing request).
- the egress session exchange devices 210 and/or 220 can be used to confirm/validate the routing/call acceptance determination calculated by the ingress session exchange device 230 .
- the ingress session exchange device 230 can request, for example, that an incoming call from source endpoint 250 be routed through egress session exchange device 210 (i.e., ingress and/or egress sessions established at egress session exchange device 210 ).
- the request can be defined based on a routing determination calculated using CAC-related information received from egress session exchange device 220 .
- the egress session exchange device 210 can use CAC-related information to verify that the routing determination calculated by ingress session exchange device 230 is appropriate.
- egress session exchange device 210 can deny the request to establish a ingress and/or egress sessions for the incoming call.
- the ingress session exchange device 230 can make a different call admission/routing determination such as egress session exchange device 220 .
- ingress session exchange device 230 can be required to hunt for a different egress session exchange device (not shown) that has, for example, the capacity to establish ingress and/or egress sessions for the incoming call to destination endpoint 290 .
- CAC-related information stored at an ingress device can be used to predict whether or not a call can be accepted at a particular device in communication with an egress device at a specified time.
- FIG. 3 is a schematic diagram of a timeline that illustrates the receipt and processing of information at an ingress device, according to an embodiment of the invention.
- the timeline illustrates a non-predictive time period 330 (between times t 1 and t 6 ) and a predictive time period 360 (between times t 6 and t 9 ).
- CAC-related information received at the ingress device during the non-predictive time period 330 is used to make call admission determinations during the predictive time period 360 .
- CAC-related information such as CAC values, CAC metadata, and/or CAC conditions
- CAC-related information 320 are received at regular intervals, in some embodiments, the CAC-related information 320 can be received at irregular time intervals or in response to a request for CAC-related information.
- a call admission determination is made at time t 4 based on the CAC-related information received during the non-predictive time period.
- CAC-related information received during the non-predictive time period 330 is used to calculate a predictive CAC value 340 during the predictive time period 360 at time t 7 .
- the predictive CAC value can also be referred to as a projected CAC value.
- the predictive CAC value calculated at time t 7 is used to make a call admission determination 350 at time t 8 based on a CAC condition.
- the predictive CAC value calculated at time t 7 can be used until the predictive CAC value is considered stale.
- the predictive CAC value may only be used (e.g., valid) for a specified period of time after the predictive CAC value has been calculated (e.g., a threshold time period). Whether or not a predictive CAC value is stale can be determined based on, for example, CAC metadata values associated with the predictive CAC value (e.g., timestamp).
- the predictive time period 360 is triggered (e.g., started) when CAC-related information is not received from the egress device, for example, for more than a threshold period of time 345 .
- the time periods between transfers of CAC-related information can be referred to as data transfer intervals.
- This threshold period of time 345 can be referred to as a predictive triggering threshold value.
- data transfer interval 342 (the time period between t 5 and t 6 ) exceeds the threshold period of time 345 .
- the predictive time period 360 is terminated (e.g., ended) when CAC-related information is once again received at time t 9 .
- the predictive time period 360 can be triggered when, for example, a CAC value from a set of CAC values exceeds a threshold limit (e.g., statistically significant aberration).
- the predictive time period is relatively short compared with the non-predictive time period.
- an ingress device can be configured to calculate predictive CAC values and make call admission determinations and/or routing determination during predictive time periods between, for example, regularly scheduled CAC-related information updates.
- the predictive CAC values can be calculated periodically and/or continuously during predictive time period 360 and stored in a memory or database. The predictive CAC values can be used, when needed, to determine whether or not a device can accept an incoming call from the ingress device.
- the predictive values can be calculated using a variety of mathematical equations and/or algorithms. For example, if a CAC value received at t x has value C x and a CAC value at t y has value C y , then a predictive CAC value C n at any time instance of n seconds after t y can be calculated using equation 1 below:
- the rate of change (e.g., trend) in the CAC values between two CAC-related information updates (at times t x and t y ) is multiplied with the number of seconds passed (n) since the last CAC value (at time t y ) and added to the last CAC value (C y ) received (at time t y ).
- the new value (C n ) can be used as the predicted CAC value at n seconds after the last CAC value received at time t y .
- a prediction index can be used to calculated a predictive CAC value.
- the prediction index can be a numerical value that specifies the number of previous CAC values (e.g., consecutive or non-consecutive) to be used when calculating a predictive CAC value. For example, an index of zero can be used to indicate that only the last CAC value received from an egress device will be used to calculate a predictive CAC value.
- Equation 2 is an equation that can be used to calculate a predictive CAC value (C n ) based on a prediction index (i) and after n seconds has passed from the last CAC value was received from an egress device:
- Equation 2 is defined such that a predictive CAC value (C n ) is calculated based on a sliding window average of CAC values C j through C j-1 over a time period t j through t j-1 .
- a larger prediction index value can be used to produce a predictive CAC value that is less sensitive to varying and/or recent CAC values and vice versa.
- FIG. 4 is a table 450 that illustrates CAC values 410 and corresponding time values 400 that are used to calculate a predictive CAC value 420 , according to an embodiment of the invention.
- the time values in column 400 are time values that can be measured in, for example, seconds or minutes and the CAC values in column 410 can be, for example, numbers of calls.
- CAC values 410 that correspond to the time values in column 400 are used to calculate the predictive CAC value of 11 shown in column 420 at time E.
- the predictive CAC value of 11 can be calculated based on, for example, equation 2. Based on the constant CAC limit of 10 shown in column 430 , the device associated with the CAC values shown in column 410 would not be able to accept a call at time E.
- FIG. 5 is a flowchart that illustrates a method for routing an incoming call to one of several egress session exchange devices, according to an embodiment of the invention.
- the flowchart illustrates that CAC-related information is received at an ingress session exchange device at 500 .
- the CAC-related information can be information broadcast from several egress session exchange devices within, for example, a VoIP or SoIP network.
- an incoming call is received at the session exchange device.
- the incoming call can be received from, for example, an IP phone or video conference phone.
- the CAC-related information in some embodiments, can be received after the incoming call is received.
- the CAC-related information is used by the ingress device to calculate whether or not the incoming call can be admitted by an endpoint in communication with an egress session exchange device at 520 .
- the egress session exchange device can be one of multiple possible egress session exchange devices that can potentially forward the incoming call to a destination endpoint.
- the admission determination is based on whether a CAC condition associated with the CAC-related information is satisfied or unsatisfied.
- the incoming call is routed to the egress session exchange device at 530 .
- the incoming call can be routed via several segments within an OSI layer 3 path. Routing from a first session exchange device to a second session exchange device can be a single hop at the OSI layer 5 session layer. For example, the call can be routed by defining and sending a session request to the egress session exchange device.
- the ingress device can deny the call, can request additional CAC-related information from one or more egress session exchange devices so that an updated CAC-related calculation can be performed, can forward the incoming call to an egress session exchange device based on a user-defined criteria, or hold the call until it is determined that an endpoint associated with an egress session exchange device can accept the incoming call.
- processor-readable media include, but are not limited to: magnetic storage media such as hard disks, floppy disks, and magnetic tape; optical storage media such as Compact Disc/Digital Video Discs (“CD/DVDs”), Compact Disc-Read Only Memories (“CD-ROMs”), and holographic devices; magneto-optical storage media such as floptical disks; carrier wave signals; and hardware devices that are specially configured to store and execute program code, such as Application-Specific Integrated Circuits (“ASICs”), Programmable Logic Devices (“PLDs”), and ROM and RAM devices.
- ASICs Application-Specific Integrated Circuits
- PLDs Programmable Logic Devices
- code examples include, but are not limited to, micro-code or micro-instructions, machine instructions, such as produced by a compiler, and files containing higher-level instructions that are executed by a computer using an interpreter.
- code examples include, but are not limited to, control signals, encrypted code, and compressed code.
- an ingress device can be configured to simultaneously process CAC-related information for multiple incoming calls.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (18)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/690,348 US7626929B2 (en) | 2006-12-28 | 2007-03-23 | Methods and apparatus for predictive call admission control within a media over internet protocol network |
EP07760643.2A EP2118748B1 (en) | 2006-12-28 | 2007-04-13 | Method for predictive call admission control within a media over internet protocol network |
PCT/US2007/066627 WO2008082680A1 (en) | 2006-12-28 | 2007-04-13 | Methods and apparatus for predictive call admission control within a media over internet protocol network |
CN2007800518396A CN101689128B (en) | 2006-12-28 | 2007-04-13 | Methods and apparatus for predictive call admission control within a media over internet protocol network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US88225306P | 2006-12-28 | 2006-12-28 | |
US11/690,348 US7626929B2 (en) | 2006-12-28 | 2007-03-23 | Methods and apparatus for predictive call admission control within a media over internet protocol network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080159136A1 US20080159136A1 (en) | 2008-07-03 |
US7626929B2 true US7626929B2 (en) | 2009-12-01 |
Family
ID=39583791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/690,348 Active 2027-08-16 US7626929B2 (en) | 2006-12-28 | 2007-03-23 | Methods and apparatus for predictive call admission control within a media over internet protocol network |
Country Status (4)
Country | Link |
---|---|
US (1) | US7626929B2 (en) |
EP (1) | EP2118748B1 (en) |
CN (1) | CN101689128B (en) |
WO (1) | WO2008082680A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080162720A1 (en) * | 2006-12-29 | 2008-07-03 | Aman Gulati | Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network |
US9705939B2 (en) | 2009-05-20 | 2017-07-11 | Peerless Network, Inc. | Self-healing inter-carrier network switch |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050033645A (en) * | 2002-08-09 | 2005-04-12 | 소시에떼 드 테크놀로지 미쉐린 | Tyre for two-wheeled vehicles |
US7764605B2 (en) * | 2004-10-07 | 2010-07-27 | Genband Inc. | Methods and systems for measurement-based call admission control in a media gateway |
US7852759B2 (en) * | 2007-02-05 | 2010-12-14 | Cisco Technology, Inc. | Finite state machine of traffic stream metrics for adaptation of load-based call admission control in wireless networks |
US9407451B1 (en) | 2008-05-16 | 2016-08-02 | Genband Us Llc | Integrating telephony applications and television broadcasts on a multimedia device |
US7945663B2 (en) * | 2008-12-29 | 2011-05-17 | Genband Inc. | Systems, methods, and computer program products for adaptively adjusting a registration interval of an endpoint |
US8773981B2 (en) | 2010-12-06 | 2014-07-08 | Genbrand US LLC | Systems and methods for dynamic congestion management in communications networks |
US9906463B2 (en) | 2011-03-03 | 2018-02-27 | Genband Us Llc | Systems and methods for intelligent network edge traffic and signaling management |
US9374434B2 (en) | 2011-07-12 | 2016-06-21 | Genband Us Llc | Methods, systems, and computer readable media for deriving user availability from user context and user responses to communications requests |
CN103686865B (en) * | 2012-09-26 | 2018-11-09 | 索尼公司 | The decision making device and method of Internet usage |
US10334254B2 (en) * | 2016-09-23 | 2019-06-25 | Apple Inc. | Feed-forward and feed-back metadata exchange in image processing pipelines to improve image quality |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6775269B1 (en) | 1999-03-30 | 2004-08-10 | Telecom Technologies, Inc. | Method and system for routing telephone calls between a public switched telephone network and an internet protocol network |
US20050041648A1 (en) | 2003-08-18 | 2005-02-24 | Nortel Networks Limited | Method and system for service denial and termination on a wireless network |
US6904017B1 (en) | 2000-05-08 | 2005-06-07 | Lucent Technologies Inc. | Method and apparatus to provide centralized call admission control and load balancing for a voice-over-IP network |
US6914883B2 (en) * | 2000-12-28 | 2005-07-05 | Alcatel | QoS monitoring system and method for a high-speed DiffServ-capable network element |
US20060077962A1 (en) * | 2004-10-07 | 2006-04-13 | Santera Systems, Inc. | Methods and systems for measurement-based call admission control in a media gateway |
US7046683B1 (en) * | 2001-07-31 | 2006-05-16 | Cisco Technology, Inc. | VoIP over access network |
US20060250959A1 (en) * | 2005-02-23 | 2006-11-09 | Haim Porat | Quality of service network and method |
US7151781B2 (en) | 2002-07-19 | 2006-12-19 | Acme Packet, Inc. | System and method for providing session admission control |
US20070019544A1 (en) | 2005-07-21 | 2007-01-25 | Nortel Networks Limited | Tandem call admission control by proxy for use with non-hop-by-hop VolP signaling protocols |
US20070036151A1 (en) | 2005-08-09 | 2007-02-15 | Alcatel | Voice over IP network architecture |
US20080049787A1 (en) * | 2006-08-22 | 2008-02-28 | Mcnaughton James L | System and method for controlling network bandwidth with a connection admission control engine |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4051794B2 (en) * | 1999-01-13 | 2008-02-27 | 富士通株式会社 | Voice gateway device and route selection method thereof |
US6791941B1 (en) * | 1999-09-28 | 2004-09-14 | Lucent Technologies Inc. | Learning-based admission control adjustment in data networks |
-
2007
- 2007-03-23 US US11/690,348 patent/US7626929B2/en active Active
- 2007-04-13 EP EP07760643.2A patent/EP2118748B1/en active Active
- 2007-04-13 WO PCT/US2007/066627 patent/WO2008082680A1/en active Application Filing
- 2007-04-13 CN CN2007800518396A patent/CN101689128B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6775269B1 (en) | 1999-03-30 | 2004-08-10 | Telecom Technologies, Inc. | Method and system for routing telephone calls between a public switched telephone network and an internet protocol network |
US6904017B1 (en) | 2000-05-08 | 2005-06-07 | Lucent Technologies Inc. | Method and apparatus to provide centralized call admission control and load balancing for a voice-over-IP network |
US6914883B2 (en) * | 2000-12-28 | 2005-07-05 | Alcatel | QoS monitoring system and method for a high-speed DiffServ-capable network element |
US7046683B1 (en) * | 2001-07-31 | 2006-05-16 | Cisco Technology, Inc. | VoIP over access network |
US7151781B2 (en) | 2002-07-19 | 2006-12-19 | Acme Packet, Inc. | System and method for providing session admission control |
US20070076603A1 (en) | 2002-07-19 | 2007-04-05 | Melampy Patrick J | System and Method for Providing Session Admission Control |
US20050041648A1 (en) | 2003-08-18 | 2005-02-24 | Nortel Networks Limited | Method and system for service denial and termination on a wireless network |
US20060077962A1 (en) * | 2004-10-07 | 2006-04-13 | Santera Systems, Inc. | Methods and systems for measurement-based call admission control in a media gateway |
US20060250959A1 (en) * | 2005-02-23 | 2006-11-09 | Haim Porat | Quality of service network and method |
US20070019544A1 (en) | 2005-07-21 | 2007-01-25 | Nortel Networks Limited | Tandem call admission control by proxy for use with non-hop-by-hop VolP signaling protocols |
US20070036151A1 (en) | 2005-08-09 | 2007-02-15 | Alcatel | Voice over IP network architecture |
US20080049787A1 (en) * | 2006-08-22 | 2008-02-28 | Mcnaughton James L | System and method for controlling network bandwidth with a connection admission control engine |
Non-Patent Citations (3)
Title |
---|
Acme Packet, Inc., "Session Admission Control: Interactive Communication SLAs over Skinny Pipes" (2002)(14 pages). |
International Search Report and Written Opinion for International Application No. PCT/US07/66627, mailed May 21, 2008, 6 pages. |
Yenra: VOIP: Session Border Controller [online], dated Oct. 18, 2004, [retrieved on Dec. 20, 2004]. Retrieved from the Internet: (2 pages). |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080162720A1 (en) * | 2006-12-29 | 2008-07-03 | Aman Gulati | Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network |
US7774481B2 (en) | 2006-12-29 | 2010-08-10 | Genband Us Llc | Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network |
US9705939B2 (en) | 2009-05-20 | 2017-07-11 | Peerless Network, Inc. | Self-healing inter-carrier network switch |
US9729586B2 (en) | 2009-05-20 | 2017-08-08 | Peerless Networks, Inc. | Auto-dialer detector for inter-carrier network switch |
US9736197B2 (en) | 2009-05-20 | 2017-08-15 | Peerless Networks, Inc. | Call extender for inter-carrier network switch |
US10148706B2 (en) | 2014-07-30 | 2018-12-04 | Peerless Network, Inc. | Systems and methods for ingress call filtering |
Also Published As
Publication number | Publication date |
---|---|
CN101689128B (en) | 2013-11-06 |
EP2118748A4 (en) | 2012-11-28 |
US20080159136A1 (en) | 2008-07-03 |
EP2118748A1 (en) | 2009-11-18 |
WO2008082680A1 (en) | 2008-07-10 |
CN101689128A (en) | 2010-03-31 |
EP2118748B1 (en) | 2019-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7626929B2 (en) | Methods and apparatus for predictive call admission control within a media over internet protocol network | |
EP2425592B1 (en) | Adaptive rate control based on overload signals | |
US6904017B1 (en) | Method and apparatus to provide centralized call admission control and load balancing for a voice-over-IP network | |
US8204043B2 (en) | Quality of service prioritization of internet protocol packets using session-aware components | |
EP2656546B1 (en) | Communications network management | |
EP2915306B1 (en) | Session admission in a communications network | |
US8259706B2 (en) | Multistage prioritization of packets within a session over internet protocol (SOIP) network | |
EP2915307B1 (en) | Communications network using a tunnel to connect two network nodes | |
JP5276589B2 (en) | A method for optimizing information transfer in telecommunications networks. | |
US8509218B2 (en) | Prioritization within a session over internet protocol (SOIP) network | |
US7047311B2 (en) | Bandwidth management apparatus and method, program therefor and recording medium with the program recorded thereon | |
US9094349B2 (en) | Aggregated resource reservation for data flows | |
US9432292B2 (en) | Overload call control in a VoIP network | |
US20080112410A1 (en) | Policy based quality of service and encryption over mpls networks | |
KR20070121665A (en) | System and method for processing quality-of-service parameters in a communication network | |
US7861003B2 (en) | Adaptive feedback for session over internet protocol | |
SE526535C2 (en) | Forwarding quality control method in data network, involves adjusting existing provisioning level for each selected interface after detecting quality violations of at least one path | |
Akyildiz et al. | A new traffic engineering manager for DiffServ/MPLS networks: design and implementation on an IP QoS testbed | |
JP7067170B2 (en) | Route control system, route control method, and program | |
US20090245129A1 (en) | Call Admission Control Method | |
JP2009200604A (en) | Link band extension amount calculating method, system and program | |
Wang et al. | A feedback control model for multiple-link adaptive bandwidth provisioning systems | |
Roh et al. | A switchable session management for the distributed multimedia-on-demand system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEXTONE COMMUNICATIONS, INC., MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MALLESAN, SARAVANAN;REEL/FRAME:019058/0403 Effective date: 20070322 |
|
AS | Assignment |
Owner name: COLUMBIA PARTNERS, L.L.C. INVESTMENT MANAGEMENT, M Free format text: SECURITY AGREEMENT;ASSIGNOR:NEXTPOINT NETWORKS, INC. (F/K/A NEXTONE COMMUNICATIONS, INC.);REEL/FRAME:020351/0432 Effective date: 20080104 Owner name: COLUMBIA PARTNERS, L.L.C. INVESTMENT MANAGEMENT,MA Free format text: SECURITY AGREEMENT;ASSIGNOR:NEXTPOINT NETWORKS, INC. (F/K/A NEXTONE COMMUNICATIONS, INC.);REEL/FRAME:020351/0432 Effective date: 20080104 |
|
AS | Assignment |
Owner name: NEXTPOINT NETWORKS, INC., MARYLAND Free format text: CHANGE OF NAME;ASSIGNOR:NEXTONE COMMUNICATIONS, INC.;REEL/FRAME:020663/0632 Effective date: 20080104 Owner name: NEXTPOINT NETWORKS, INC.,MARYLAND Free format text: CHANGE OF NAME;ASSIGNOR:NEXTONE COMMUNICATIONS, INC.;REEL/FRAME:020663/0632 Effective date: 20080104 |
|
AS | Assignment |
Owner name: NEXTPOINT NETWORKS, INC., MARYLAND Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COLUMBIA PARTNERS, L.L.C., AS AGENT AND INVESTMENT MANAGER;REEL/FRAME:021744/0677 Effective date: 20080917 Owner name: NEXTPOINT NETWORKS, INC.,MARYLAND Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COLUMBIA PARTNERS, L.L.C., AS AGENT AND INVESTMENT MANAGER;REEL/FRAME:021744/0677 Effective date: 20080917 |
|
AS | Assignment |
Owner name: GENBAND INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEXTPOINT NETWORKS, INC.;REEL/FRAME:022716/0303 Effective date: 20090220 Owner name: GENBAND INC.,TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEXTPOINT NETWORKS, INC.;REEL/FRAME:022716/0303 Effective date: 20090220 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: GENBAND US LLC,TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:GENBAND INC.;REEL/FRAME:024468/0507 Effective date: 20100527 Owner name: GENBAND US LLC, TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:GENBAND INC.;REEL/FRAME:024468/0507 Effective date: 20100527 |
|
AS | Assignment |
Owner name: ONE EQUITY PARTNERS III, L.P., AS COLLATERAL AGENT Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:024555/0809 Effective date: 20100528 |
|
AS | Assignment |
Owner name: COMERICA BANK, MICHIGAN Free format text: SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:025333/0054 Effective date: 20101028 |
|
AS | Assignment |
Owner name: COMERICA BANK (A TEXAS BANKING ASSOCIATION), AS AGENT; ATTN: NATIONAL DOCUMENTATION SERVICES, MICHIGAN Free format text: AMENDED AND RESTATED INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:GENBEND US LLC (A DELAWARE LLC);REEL/FRAME:027315/0293 Effective date: 20110729 Owner name: COMERICA BANK (A TEXAS BANKING ASSOCIATION), AS AG Free format text: AMENDED AND RESTATED INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:GENBEND US LLC (A DELAWARE LLC);REEL/FRAME:027315/0293 Effective date: 20110729 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: GENBAND US LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ONE EQUITY PARTNERS III, L.P., AS COLLATERAL AGENT;REEL/FRAME:031968/0955 Effective date: 20121219 |
|
AS | Assignment |
Owner name: GENBAND US LLC, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PATENT NO. 7,926,929 SHOULD BE 7,626,929 PREVIOUSLY RECORDED ON REEL 031968 FRAME 0955. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE BY SECURED PARTY;ASSIGNOR:ONE EQUITY PARTNERS III, L.P., AS COLLATERAL AGENT;REEL/FRAME:032114/0563 Effective date: 20121219 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:039269/0234 Effective date: 20160701 Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:039269/0234 Effective date: 20160701 |
|
AS | Assignment |
Owner name: GENBAND US LLC, TEXAS Free format text: RELEASE AND REASSIGNMENT OF PATENTS;ASSIGNOR:COMERICA BANK, AS AGENT;REEL/FRAME:039280/0467 Effective date: 20160701 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080 Effective date: 20160701 Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080 Effective date: 20160701 Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI Free format text: CORRECTIVE ASSIGNMENT TO CORRECT PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080 Effective date: 20160701 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: GENBAND US LLC, TEXAS Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT;REEL/FRAME:044986/0303 Effective date: 20171221 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:GENBAND US LLC;SONUS NETWORKS, INC.;REEL/FRAME:044978/0801 Effective date: 20171229 Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI Free format text: SECURITY INTEREST;ASSIGNORS:GENBAND US LLC;SONUS NETWORKS, INC.;REEL/FRAME:044978/0801 Effective date: 20171229 |
|
AS | Assignment |
Owner name: CITIZENS BANK, N.A., AS ADMINISTRATIVE AGENT, MASSACHUSETTS Free format text: SECURITY INTEREST;ASSIGNOR:RIBBON COMMUNICATIONS OPERATING COMPANY, INC.;REEL/FRAME:052076/0905 Effective date: 20200303 |
|
AS | Assignment |
Owner name: RIBBON COMMUNICATIONS OPERATING COMPANY, INC., MASSACHUSETTS Free format text: MERGER;ASSIGNOR:GENBAND US LLC;REEL/FRAME:053223/0260 Effective date: 20191220 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.), MASSACHUSETTS Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT R/F 044978/0801;ASSIGNOR:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT;REEL/FRAME:058949/0497 Effective date: 20200303 |
|
AS | Assignment |
Owner name: RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.), MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIZENS BANK, N.A.;REEL/FRAME:067822/0433 Effective date: 20240620 |
|
AS | Assignment |
Owner name: RIBBON COMMUNICATIONS OPERATING COMPANY, INC., MASSACHUSETTS Free format text: MERGER AND CHANGE OF NAME;ASSIGNORS:GENBAND US LLC;RIBBON COMMUNICATION OPERATING COMPANY, INC.;REEL/FRAME:068462/0379 Effective date: 20191220 |
|
AS | Assignment |
Owner name: HPS INVESTMENT PARTNERS, LLC, AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SHORT-FORM PATENTS SECURITY AGREEMENT;ASSIGNOR:RIBBON COMMUNICATIONS OPERATING COMPANY, INC.;REEL/FRAME:068857/0290 Effective date: 20240826 |